Skip to main content

CVE-2022-26884: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Apache Software Foundation Apache DolphinScheduler

Medium
VulnerabilityCVE-2022-26884cvecve-2022-26884cwe-22
Published: Fri Oct 28 2022 (10/28/2022, 00:00:00 UTC)
Source: CVE
Vendor/Project: Apache Software Foundation
Product: Apache DolphinScheduler

Description

Users can read any files by log server, Apache DolphinScheduler users should upgrade to version 2.0.6 or higher.

AI-Powered Analysis

AILast updated: 07/05/2025, 13:12:12 UTC

Technical Analysis

CVE-2022-26884 is a medium severity vulnerability classified as CWE-22, which pertains to improper limitation of a pathname to a restricted directory, commonly known as a path traversal vulnerability. This vulnerability affects Apache DolphinScheduler, an open-source distributed workflow scheduling platform developed by the Apache Software Foundation. The flaw allows users with log server access privileges to read arbitrary files on the server by exploiting insufficient validation of file path inputs. Specifically, the vulnerability enables an attacker to traverse directories outside the intended restricted directory by manipulating pathname inputs, thereby gaining unauthorized read access to sensitive files. The vulnerability does not require user interaction but does require the attacker to have some level of privileges (PR:L - privileges required: low). The CVSS v3.1 base score is 6.5, indicating a medium severity level, with the vector AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N. This means the attack can be performed remotely over the network with low attack complexity, requires low privileges, no user interaction, and impacts confidentiality with high impact, but does not affect integrity or availability. No known exploits in the wild have been reported to date. The recommended remediation is to upgrade Apache DolphinScheduler to version 2.0.6 or higher, where this vulnerability has been addressed. Since the vulnerability allows unauthorized reading of arbitrary files, it poses a risk of sensitive data exposure, including configuration files, credentials, or other critical information stored on the server hosting the DolphinScheduler log service.

Potential Impact

For European organizations using Apache DolphinScheduler, this vulnerability could lead to unauthorized disclosure of sensitive information, potentially including personally identifiable information (PII), intellectual property, or security credentials. Given the GDPR regulations in Europe, unauthorized data exposure could result in significant legal and financial penalties. The impact is particularly critical for organizations that use DolphinScheduler in environments handling sensitive or regulated data, such as financial institutions, healthcare providers, and government agencies. Attackers exploiting this vulnerability could gain insights into system configurations or credentials that facilitate further attacks or lateral movement within the network. Although the vulnerability does not directly affect system integrity or availability, the confidentiality breach alone can have severe repercussions on trust, compliance, and operational security.

Mitigation Recommendations

European organizations should prioritize upgrading Apache DolphinScheduler to version 2.0.6 or later as the primary mitigation step. Additionally, organizations should audit and restrict access to the log server component to only trusted and authenticated users with a need-to-know basis. Implement strict access controls and network segmentation to limit exposure of the DolphinScheduler log server to untrusted networks. Employ monitoring and alerting on unusual file access patterns or attempts to access sensitive files through the log server interface. Conduct regular security assessments and penetration testing focused on path traversal and file access vulnerabilities. Where possible, implement application-layer filtering or web application firewalls (WAFs) to detect and block path traversal attempts. Finally, ensure that sensitive files on the server are protected with appropriate filesystem permissions and encryption to reduce the impact of potential unauthorized access.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
apache
Date Reserved
2022-03-11T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d981ac4522896dcbd974a

Added to database: 5/21/2025, 9:08:42 AM

Last enriched: 7/5/2025, 1:12:12 PM

Last updated: 7/31/2025, 2:22:41 AM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats